Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+modeling+course"
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Cyber Attacks, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: Free
Johns Hopkins University
Skills you'll gain: Epidemiology, Infectious Diseases, Policy Analysis, Mathematical Modeling, Statistical Modeling, Public Policies, Data Modeling, Predictive Modeling, Risk Analysis, Statistical Analysis, Decision Support Systems, Vulnerability
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Crisis Management, Public Safety and National Security, Cybersecurity, Analysis, Complex Problem Solving, International Relations, Governance, Political Sciences
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Personally Identifiable Information, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
Skills you'll gain: Risk Management Framework, Cyber Risk, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cybersecurity, Security Management, Cyber Governance, Cyber Security Strategy, Risk Management, Security Controls, Continuous Monitoring, Infrastructure Security, Cyber Security Assessment, Incident Response, Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
University of California, Davis
Skills you'll gain: Process Control, Safety Assurance, Process Engineering, Health And Safety Standards, Failure Analysis, Engineering Analysis, Engineering Calculations, Risk Analysis, Mathematical Modeling, Estimation, Mechanics, Applied Mathematics
In summary, here are 10 of our most popular threat+modeling+course courses
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Assets, Threats, and Vulnerabilities: Google
- Application Security for Developers and DevOps Professionals: IBM
- Infectious Disease Transmission Models for Decision-Makers: Johns Hopkins University
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Introduction to the Threat Intelligence Lifecycle : IBM
- Cybersecurity Compliance Framework, Standards & Regulations: IBM
- Security & Safety Challenges in a Globalized World: Universiteit Leiden
- A Strategic Approach to Cybersecurity: University of Maryland, College Park
- Cybersecurity Risk Management Framework: Infosec